lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1344131721.20060526194656@SECURITY.NNOV.RU>
Date: Fri, 26 May 2006 19:46:56 +0400
From: 3APA3A <3APA3A@...URITY.NNOV.RU>
To: thesinoda@...mail.com
Cc: bugtraq@...urityfocus.com
Subject: Re: A Nasty Security Bug that affect PGP Virtual Disks & PGP SDA , PGP 8.x & 9.x and Truecrypt.


Dear thesinoda@...mail.com,

Sorry,  but  I  see  no security vulnerability here.

Disk encryption usually works this way:

1.  Disk  is  divided to blocks (or files). Each block is encrypted with
random  symmetric  key  to  extend  security  and encryption/description
speed.
2. Block key is encrypted with user's public key (or sometimes symmetric
key)
3.  User's  private  key  (or  shared  symmetric  key) is encrypted with
passphrase and is used for decryption.

If  you change passphrase, you decrypt your key and encrypt it with news
one.  Key  itself is not changed, because if key is changed you will not
be able to decrypt files.

Then  you give your disk with passphrase to someone - you actually share
your  private  key.  This  is the point YOU break security (or person who
accepts your key as his own). Now, you both share same key, and changing
passphrase  to encrypt this key doesn't help. Actually, what you do with
cut-and-paster is restoring your key encrypted with old passphrase. It's
expected behaviour.

--Thursday, May 25, 2006, 12:55:35 AM, you wrote to bugtraq@...urityfocus.com:

thc>     * After changing the passphrase the OLD passphrase SHOULD NOT work.
thc>     * Open pgpdisk.pgd and pgpdisk_backup.pgd in HEX editor
thc> e.g Ultraedit ONLY CHANGE WHERE YOU SEE A RED RECTANGULAR.
...
thc>     * Do some copy and past from the back-up file into pgpdisk.pgd



-- 
~/ZARAZA
http://www.security.nnov.ru/



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ